Unlock instant, AI-driven research and patent intelligence for your innovation.

A source location privacy protection method based on dynamic phantom node strategy

A phantom node, privacy protection technology, applied in the direction of location information-based services, specific environment-based services, security devices, etc., can solve the problems of complex data transmission paths, data packet transmission delay and large node energy consumption, etc. Achieve the effect of improving high randomness, controlling energy consumption and avoiding loop routing

Active Publication Date: 2022-07-26
ZHEJIANG UNIV OF TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can enhance the protection strength of node location privacy, the data transmission path is too complicated, resulting in the transmission delay of data packets and the energy consumption of nodes. It is not suitable for networks with small network scale or short transmission path.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A source location privacy protection method based on dynamic phantom node strategy
  • A source location privacy protection method based on dynamic phantom node strategy
  • A source location privacy protection method based on dynamic phantom node strategy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to be able to describe the technical content of the present invention more clearly, further description is given below with reference to specific examples.

[0055] refer to Figure 1 to Figure 5 , a source location privacy protection method for dynamic phantom node strategy, this method aims at the source location privacy protection problem in wireless sensor networks, considers the visible area and hierarchy to construct candidate phantom node regions, and uses partition-based phantom node scheduling The strategy improves privacy security strength by maximizing the randomness of phantom node locations without extending the transmission path. When constructing the backbone route, the remaining energy of the node and the number of neighbor nodes are considered, and the optimal path is selected by analyzing the captured probability of the node. At the same time, the nodes on the transmission path always forward data packets in the direction of the sink node, av...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A source location privacy protection method for dynamic phantom node strategy, the method is aimed at source traceability attacks in wireless sensor networks, and the method is divided into the following steps: building a distributed network model, network initialization phase, determining the location area of ​​phantom nodes, phantom nodes The location area is divided, the phantom nodes are dynamically selected, and the backbone network is constructed. This method builds a distributed network structure oriented to privacy protection of source location, uses a dynamic phantom node strategy that considers the visible area, while controlling the length of phantom paths, the high randomness of phantom node locations is improved, and when constructing backbone routing Considering the remaining energy of the node and the number of neighbor nodes, the time required for the attacker to trace back to the source node is effectively prolonged. In addition, since the nodes on the transmission path always transmit data packets in the direction of the sink node, loop routing is avoided, and the energy consumption overhead and transmission delay are effectively controlled.

Description

technical field [0001] The invention relates to the field of wireless sensor network security, in particular to a source location privacy protection method for a dynamic phantom node strategy. Background technique [0002] The wireless sensor network (Wireless Sensor Network, WSN) has a very wide range of applications, involving medical, environmental, home, industry, aviation and military and so on. The wireless sensor network consists of a large number of low-cost micro-sensors deployed in the monitoring area. The energy supply, storage capacity, computing power and communication bandwidth of these sensor nodes are usually limited, so the function of a single node is relatively weak. The powerful functions of the node are realized through cooperation between nodes. In addition, the wireless sensor network uses an open and transparent wireless communication channel, which makes nodes vulnerable to malicious attacks by intruders when transmitting data. [0003] At present,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/02H04W4/38H04W12/03H04W12/63H04W84/18
CPCH04W4/025H04W4/38H04W84/18H04W12/02H04W12/63Y02D30/70
Inventor 洪榛李涛涛安曼俞立
Owner ZHEJIANG UNIV OF TECH